Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Development
    • IT Management

    Web 2.0 Security Hangover

    Written by

    Brian Prince
    Published April 2, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Web 2.0 applications have certainly made the user experience more interactive, but organizations need to be mindful of their impact on Web site security.

      Certainly, there are a number of reasons Web sites become an attractive target for hackers; sometimes sites are built prior to an attack being known about, or the developers were in a hurry. Still, some researchers say the Web 2.0 rush has had an impact on security as well, opening up new possibilities for attackers.

      “The Web used to be a very static delivery method,” said Mary Landesman, senior security researcher at ScanSafe. “All we could do is go to a site and read it. We couldn’t interact with it.”

      But in today’s dynamic Web 2.0 environment, there is a lot of give-and-take of information, from visitors leaving comments to third-party advertising being pushed in by affiliate ad programs, Landesman said.

      “There’s a lot of Web applications that are now involved,” she said. “It just opens the door for exploits, either within the Web application, or through social engineering or by a hostile person inserting themselves at some point in this chain of affiliate relationships.”

      Waking up to the Web 2.0 hangover

      In ScanSafe’s Annual Global Threat report released March 31, researchers said there were numerous instances of malware hidden in banner ads in 2007, including a Trojan-laced banner ad displayed on high-profile Web 2.0 sites such as MySpace and Photobucket.

      Still, all the attacks that plagued Web 1.0 are still around today, said Jeremiah Grossman, chief technology officer at WhiteHat Security.

      “While Web 2.0 technologies have added some new attack techniques, they really aren’t the issues we need to be most concerned about when comparing to the existing issues,” Grossman said. “The issues we need to tackle have been firmly rooted into the system since the Web began … What Web 2.0 has done is added additional complexity to the attack surface, which has proved difficult for everyone to fully understand.”

      Click here for eWEEK’s Security Dictionary.

      A lineup of common Web site vulnerabilities will certainly feature some familiar faces; for example, a recent report by WhiteHat Security listed cross-site scripting vulnerabilities as the most commonly found. Officials at the company, which provides Web site security services, urge enterprises to prioritize all their Web sites by their importance to the business and to note the party responsible for their security. The company also recommends that businesses take a defense-in-depth approach to Web site security that includes everything from vulnerability assessment to Web application firewalls.

      “When we consider the risks [of Web 2.0], clearly the underlying Web applications themselves have the same inherent vulnerabilities that Web 1.0 applications had,” said Oliver Friedrichs, director of emerging technologies for Symantec Security Response. “The risks themselves are very, very similar to what we’ve seen in the past, it’s just a different set of protocols and client-side functions that are being used.”

      Paul Roberts, an analyst with The 451 Group, commented, “I think what you’re seeing really is kind of the hangover that is coming after the exuberance, the party that was Web 2.0. People have developed a lot of code using some of the new tools that are available, using some of the new development techniques, and there is more interest in the capabilities of those … than there has been [in] the security of the code.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.